Supplier & Third-Party Security
Rating
0
0
There are no comments for now.
Join this Course
to be the first to leave a comment.
1.
Why do third-party suppliers create security risk?
2.
Which of the following BEST describes supplier due diligence?
3.
A vendor requests permanent administrator access “for future troubleshooting convenience”. What is the BEST response?
4.
Which of the following is a common third-party security failure?
5.
Why should third-party access follow least privilege principles?
6.
What is the primary purpose of supplier security monitoring?
7.
Which statement about SaaS providers is MOST accurate?
8.
Which of the following should be included in supplier security contracts where appropriate?
9.
Why is supplier offboarding important?
10.
Which of the following is an example of shadow IT?
11.
What should employees do if they identify suspicious supplier activity?
12.
Why is data protection important in supplier relationships?
13.
Which of the following BEST demonstrates secure supplier governance?
14.
What is a major risk associated with third-party integrations?
15.
Why should employees use only approved vendors and services?
16.
Which of the following is an example of poor supplier security practice?
17.
What responsibility do managers and leaders have regarding supplier security?
18.
What may happen if supplier security is poorly managed?
19.
Which behaviour BEST supports secure third-party management?
20.
What is the BEST overall approach to supplier and third-party security?